Security Protocols

Volume 3364 of the series Lecture Notes in Computer Science pp 218-232

WAR: Wireless Anonymous Routing

  • Matt BlazeAffiliated withAT&T Labs – Research
  • , John IoannidisAffiliated withAT&T Labs – Research
  • , Angelos D. KeromytisAffiliated withCS Department, Columbia University
  • , Tal MalkinAffiliated withCS Department, Columbia University
  • , Avi RubinAffiliated withJohns Hopkins University

* Final gross prices may vary according to local VAT.

Get Access


There have been many efforts to anonymize traffic in traditional point-to-point networks. However, these techniques do not map directly onto wireless systems because the two types of networks have different properties. For example, whereas in wired networks adjacent communication links must know each others’ addresses, wireless networks broadcast messages. Thus, an adversary may be able to obtain global information about network traffic. On the other hand, a wireless receiver’s identity may not need to be known to anyone.

We introduce Wireless Anonymous Routing (WAR).We describe a threat model for WAR and compare it to its wired counterpart. We show that traditional anonymity protocols are either insecure or perform poorly when applied to the wireless model, and we describe new protocols that preserve security with better performance.